{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:41Z","timestamp":1750309361181,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T00:00:00Z","timestamp":1724457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSFC","award":["U20B2053"],"award-info":[{"award-number":["U20B2053"]}]},{"name":"UGC Research Matching Grants","award":["RMGS20EG01-D,RMGS20CR11,RMGS20CR12,RMGS20EG19,RMGS20EG21,RMGS23CR05,RMGS23EG08"],"award-info":[{"award-number":["RMGS20EG01-D,RMGS20CR11,RMGS20CR12,RMGS20EG19,RMGS20EG21,RMGS23CR05,RMGS23EG08"]}]},{"name":"RIF","award":["R6020-19,R6021-20"],"award-info":[{"award-number":["R6020-19,R6021-20"]}]},{"name":"GRF","award":["16211520,16205322"],"award-info":[{"award-number":["16211520,16205322"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,25]]},"DOI":"10.1145\/3637528.3671678","type":"proceedings-article","created":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T04:55:12Z","timestamp":1724561712000},"page":"1108-1118","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-Preserved Neural Graph Databases"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4499-7805","authenticated-orcid":false,"given":"Qi","family":"Hu","sequence":"first","affiliation":[{"name":"Department of CSE, Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1656-1278","authenticated-orcid":false,"given":"Haoran","family":"Li","sequence":"additional","affiliation":[{"name":"Department of CSE, Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8985-6467","authenticated-orcid":false,"given":"Jiaxin","family":"Bai","sequence":"additional","affiliation":[{"name":"Department of CSE, Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3919-0396","authenticated-orcid":false,"given":"Zihao","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of CSE, Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7818-6090","authenticated-orcid":false,"given":"Yangqiu","family":"Song","sequence":"additional","affiliation":[{"name":"Department of CSE, Hong Kong University of Science and Technology, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2024,8,24]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Complex Query Answering with Neural Link Predictors. In International Conference on Learning Representations.","author":"Arakelyan Erik","year":"2021","unstructured":"Erik Arakelyan, Daniel Daza, Pasquale Minervini, and Michael Cochez. 2021. Complex Query Answering with Neural Link Predictors. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Jiaxin Bai Chen Luo Zheng Li Qingyu Yin Bing Yin and Yangqiu Song. 2023. Knowledge Graph Reasoning over Entities and Numerical Values. In KDD. ACM 57--68.","DOI":"10.1145\/3580305.3599399"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.findings-naacl.207"},{"key":"e_1_3_2_2_4_1","volume-title":"Sequential query encoding for complex query answering on knowledge graphs. arXiv preprint arXiv:2302.13114","author":"Bai Jiaxin","year":"2023","unstructured":"Jiaxin Bai, Tianshi Zheng, and Yangqiu Song. 2023. Sequential query encoding for complex query answering on knowledge graphs. arXiv preprint arXiv:2302.13114 (2023)."},{"key":"e_1_3_2_2_5_1","volume-title":"International Conference on Machine Learning. PMLR, 1472--1491","author":"Bai Yushi","year":"2023","unstructured":"Yushi Bai, Xin Lv, Juanzi Li, and Lei Hou. 2023. Answering complex logical queries on knowledge graphs via query computation tree optimization. In International Conference on Machine Learning. PMLR, 1472--1491."},{"key":"e_1_3_2_2_6_1","volume-title":"Learning on Graphs Conference. PMLR, 31-1.","author":"Besta Maciej","year":"2022","unstructured":"Maciej Besta, Patrick Iff, Florian Scheidl, Kazuki Osawa, Nikoli Dryden, Michal Podstawski, Tiancheng Chen, and Torsten Hoefler. 2022. Neural graph databases. In Learning on Graphs Conference. PMLR, 31-1."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2009.07.002"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376746"},{"key":"e_1_3_2_2_9_1","volume-title":"Translating embeddings for modeling multi-relational data. Advances in neural information processing systems","author":"Bordes Antoine","year":"2013","unstructured":"Antoine Bordes, Nicolas Usunier, Alberto Garcia-Duran, Jason Weston, and Oksana Yakhnenko. 2013. Translating embeddings for modeling multi-relational data. Advances in neural information processing systems, Vol. 26 (2013)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v24i1.7519"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20310"},{"key":"e_1_3_2_2_12_1","first-page":"23440","article-title":"Probabilistic entity representation model for reasoning over knowledge graphs","volume":"34","author":"Choudhary Nurendra","year":"2021","unstructured":"Nurendra Choudhary, Nikhil Rao, Sumeet Katariya, Karthik Subbian, and Chandan Reddy. 2021. Probabilistic entity representation model for reasoning over knowledge graphs. Advances in Neural Information Processing Systems, Vol. 34 (2021), 23440--23451.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_13_1","volume-title":"Gaurav Aggarwal, and Prateek Jain.","author":"Daigavane Ameya","year":"2021","unstructured":"Ameya Daigavane, Gagan Madan, Aditya Sinha, Abhradeep Guha Thakurta, Gaurav Aggarwal, and Prateek Jain. 2021. Node-level differentially private graph neural networks. arXiv preprint arXiv:2111.15521 (2021)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2926745"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219938"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Vasisht Duddu Antoine Boutet and Virat Shejwalkar. 2020. Quantifying privacy leakage in graph embedding. In MobiQuitous 2020--17th EAI International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services. 76--85.","DOI":"10.1145\/3448891.3448939"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_2_18_1","volume-title":"From Local to Global: A Graph RAG Approach to Query-Focused Summarization. arXiv preprint arXiv:2404.16130","author":"Edge Darren","year":"2024","unstructured":"Darren Edge, Ha Trinh, Newman Cheng, Joshua Bradley, Alex Chao, Apurva Mody, Steven Truitt, and Jonathan Larson. 2024. From Local to Global: A Graph RAG Approach to Query-Focused Summarization. arXiv preprint arXiv:2404.16130 (2024)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488425"},{"key":"e_1_3_2_2_20_1","volume-title":"Retrieval-augmented generation for large language models: A survey. arXiv preprint arXiv:2312.10997","author":"Gao Yunfan","year":"2023","unstructured":"Yunfan Gao, Yun Xiong, Xinyu Gao, Kangxiang Jia, Jinliu Pan, Yuxi Bi, Yi Dai, Jiawei Sun, and Haofen Wang. 2023. Retrieval-augmented generation for large language models: A survey. arXiv preprint arXiv:2312.10997 (2023)."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154793"},{"key":"e_1_3_2_2_22_1","volume-title":"ICML (Proceedings of Machine Learning Research","volume":"3938","author":"Guu Kelvin","year":"2020","unstructured":"Kelvin Guu, Kenton Lee, Zora Tung, Panupong Pasupat, and Ming-Wei Chang. 2020. Retrieval Augmented Language Model Pre-Training. In ICML (Proceedings of Machine Learning Research, Vol. 119). PMLR, 3929--3938."},{"key":"e_1_3_2_2_23_1","volume-title":"Embedding logical queries on knowledge graphs. Advances in neural information processing systems","author":"Hamilton Will","year":"2018","unstructured":"Will Hamilton, Payal Bajaj, Marinka Zitnik, Dan Jurafsky, and Jure Leskovec. 2018. Embedding logical queries on knowledge graphs. Advances in neural information processing systems, Vol. 31 (2018)."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453873"},{"key":"e_1_3_2_2_25_1","volume-title":"Fedgraphnn: A federated learning system and benchmark for graph neural networks. arXiv preprint arXiv:2104.07145","author":"He Chaoyang","year":"2021","unstructured":"Chaoyang He, Keshav Balasubramanian, Emir Ceyani, Carl Yang, Han Xie, Lichao Sun, Lifang He, Liangwei Yang, Philip S Yu, Yu Rong, et al. 2021. Fedgraphnn: A federated learning system and benchmark for graph neural networks. arXiv preprint arXiv:2104.07145 (2021)."},{"key":"e_1_3_2_2_26_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"He Xinlei","year":"2021","unstructured":"Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, and Yang Zhang. 2021. Stealing links from graph neural networks. In 30th USENIX Security Symposium (USENIX Security 21). 2669--2686."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57878-7_6"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511975"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3614933"},{"key":"e_1_3_2_2_30_1","volume-title":"User Consented Federated Recommender System Against Personalized Attribute Inference Attack. arXiv preprint arXiv:2312.16203","author":"Hu Qi","year":"2023","unstructured":"Qi Hu and Yangqiu Song. 2023. User Consented Federated Recommender System Against Personalized Attribute Inference Attack. arXiv preprint arXiv:2312.16203 (2023)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_26"},{"key":"e_1_3_2_2_32_1","unstructured":"Bhushan Kotnis and Alberto Garc\u00eda-Dur\u00e1n. 2018. Learning numerical attributes in knowledge bases. In Automated Knowledge Base Construction (AKBC)."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i6.16630"},{"volume-title":"ACL (1)","author":"Lee Kenton","key":"e_1_3_2_2_34_1","unstructured":"Kenton Lee, Ming-Wei Chang, and Kristina Toutanova. 2019. Latent Retrieval for Weakly Supervised Open Domain Question Answering. In ACL (1). Association for Computational Linguistics, 6086--6096."},{"key":"e_1_3_2_2_35_1","volume-title":"Privacy in large language models: Attacks, defenses and future directions. arXiv preprint arXiv:2310.10383","author":"Li Haoran","year":"2023","unstructured":"Haoran Li, Yulin Chen, Jinglong Luo, Yan Kang, Xiaojin Zhang, Qi Hu, Chunkit Chan, and Yangqiu Song. 2023. Privacy in large language models: Attacks, defenses and future directions. arXiv preprint arXiv:2310.10383 (2023)."},{"key":"e_1_3_2_2_36_1","volume-title":"P-Bench: A Multi-level Privacy Evaluation Benchmark for Language Models. arXiv preprint arXiv:2311.04044","author":"Li Haoran","year":"2023","unstructured":"Haoran Li, Dadi Guo, Donghao Li, Wei Fan, Qi Hu, Xin Liu, Chunkit Chan, Duanyi Yao, and Yangqiu Song. 2023. P-Bench: A Multi-level Privacy Evaluation Benchmark for Language Models. arXiv preprint arXiv:2311.04044 (2023)."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3036583"},{"key":"e_1_3_2_2_38_1","unstructured":"Peiyuan Liao Han Zhao Keyulu Xu Tommi S Jaakkola Geoff Gordon Stefanie Jegelka and Ruslan Salakhutdinov. 2020. Graph adversarial networks: Protecting information against adversarial attacks. (2020)."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539302"},{"key":"e_1_3_2_2_40_1","volume-title":"ECAI","author":"Liu Junnan","year":"2023","unstructured":"Junnan Liu, Qianren Mao, Jianxin Li, Xingcheng Fu, and Zheng Wang. 2023. POINE 2: Improving Poincar\u00e9 Embeddings for Hierarchy-Aware Complex Query Reasoning over Knowledge Graphs. In ECAI 2023. IOS Press, 1521--1528."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376629"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467375"},{"key":"e_1_3_2_2_43_1","volume-title":"GNN-RAG: Graph Neural Retrieval for Large Language Model Reasoning. arXiv preprint arXiv:2405.20139","author":"Mavromatis Costas","year":"2024","unstructured":"Costas Mavromatis and George Karypis. 2024. GNN-RAG: Graph Neural Retrieval for Large Language Model Reasoning. arXiv preprint arXiv:2405.20139 (2024)."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539232"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPSISA52974.2021.00002"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482252"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2020.113303"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134086"},{"key":"e_1_3_2_2_49_1","volume-title":"Neural graph reasoning: Complex logical query answering meets graph databases. arXiv preprint arXiv:2303.14617","author":"Ren Hongyu","year":"2023","unstructured":"Hongyu Ren, Mikhail Galkin, Michael Cochez, Zhaocheng Zhu, and Jure Leskovec. 2023. Neural graph reasoning: Complex logical query answering meets graph databases. arXiv preprint arXiv:2303.14617 (2023)."},{"key":"e_1_3_2_2_50_1","volume-title":"Query2box: Reasoning over knowledge graphs in vector space using box embeddings. arXiv preprint arXiv:2002.05969","author":"Ren Hongyu","year":"2020","unstructured":"Hongyu Ren, Weihua Hu, and Jure Leskovec. 2020. Query2box: Reasoning over knowledge graphs in vector space using box embeddings. arXiv preprint arXiv:2002.05969 (2020)."},{"key":"e_1_3_2_2_51_1","first-page":"19716","article-title":"Beta embeddings for multi-hop logical reasoning in knowledge graphs","volume":"33","author":"Ren Hongyu","year":"2020","unstructured":"Hongyu Ren and Jure Leskovec. 2020. Beta embeddings for multi-hop logical reasoning in knowledge graphs. Advances in Neural Information Processing Systems, Vol. 33 (2020), 19716--19726.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_52_1","volume-title":"Proceedings of the international AAAI conference on web and social media","volume":"9","author":"Rossi Luca","year":"2015","unstructured":"Luca Rossi, Mirco Musolesi, and Andrea Torsello. 2015. On the k-anonymization of time-varying and multi-layer social graphs. In Proceedings of the international AAAI conference on web and social media, Vol. 9. 377--386."},{"key":"e_1_3_2_2_53_1","volume-title":"Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246","author":"Salem Ahmed","year":"2018","unstructured":"Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, and Michael Backes. 2018. Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246 (2018)."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487601"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242667"},{"volume-title":"25th USENIX security symposium (USENIX Security 16). 601--618.","author":"Tram\u00e8r Florian","key":"e_1_3_2_2_56_1","unstructured":"Florian Tram\u00e8r, Fan Zhang, Ari Juels, Michael K Reiter, and Thomas Ristenpart. 2016. Stealing machine learning models via prediction {APIs}. In 25th USENIX security symposium (USENIX Security 16). 601--618."},{"key":"e_1_3_2_2_57_1","volume-title":"Attention is all you need. Advances in neural information processing systems","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems, Vol. 30 (2017)."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467273"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-acl.864"},{"key":"e_1_3_2_2_60_1","volume-title":"Logical Message Passing Networks with One-hop Inference on Atomic Formulas. In The Eleventh International Conference on Learning Representations.","author":"Wang Zihao","year":"2023","unstructured":"Zihao Wang, Yangqiu Song, Ginny Wong, and Simon See. 2023. Logical Message Passing Networks with One-hop Inference on Atomic Formulas. In The Eleventh International Conference on Learning Representations."},{"key":"e_1_3_2_2_61_1","unstructured":"Zihao Wang Hang Yin and Yangqiu Song. 2021. Benchmarking the Combinatorial Generalizability of Complex Query Answering on Knowledge Graphs. In NeurIPS Datasets and Benchmarks Track. https:\/\/openreview.net\/forum?id=pX4x8f6Km5T"},{"key":"e_1_3_2_2_62_1","first-page":"3","article-title":"Logical Queries on Knowledge Graphs: Emerging Interface of Incomplete Relational Data","volume":"45","author":"Wang Zihao","year":"2022","unstructured":"Zihao Wang, Hang Yin, and Yangqiu Song. 2022. Logical Queries on Knowledge Graphs: Emerging Interface of Incomplete Relational Data. Bulletin of the Technical Committee on Data Engineering, Vol. 45, 4 (2022), 3--18.","journal-title":"Bulletin of the Technical Committee on Data Engineering"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833806"},{"key":"e_1_3_2_2_64_1","volume-title":"Query2Triple: Unified Query Encoding for Answering Diverse Complex Queries over Knowledge Graphs. arXiv preprint arXiv:2310.11246","author":"Xu Yao","year":"2023","unstructured":"Yao Xu, Shizhu He, Cunguang Wang, Li Cai, Kang Liu, and Jun Zhao. 2023. Query2Triple: Unified Query Encoding for Answering Diverse Complex Queries over Knowledge Graphs. arXiv preprint arXiv:2310.11246 (2023)."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.emnlp-main.47"},{"key":"e_1_3_2_2_66_1","volume-title":"Rethinking Complex Queries on Knowledge Graphs with Neural Link Predictors. In The Twelfth International Conference on Learning Representations (ICLR","author":"Yin Hang","year":"2024","unstructured":"Hang Yin, Zihao Wang, and Yangqiu Song. 2024. Rethinking Complex Queries on Knowledge Graphs with Neural Link Predictors. In The Twelfth International Conference on Learning Representations (ICLR 2024)."},{"key":"e_1_3_2_2_67_1","volume-title":"A neural database for answering aggregate queries on incomplete relational data","author":"Zeighami Sepanta","year":"2023","unstructured":"Sepanta Zeighami, Raghav Seshadri, and Cyrus Shahabi. 2023. A neural database for answering aggregate queries on incomplete relational data. IEEE Transactions on Knowledge and Data Engineering (2023)."},{"key":"e_1_3_2_2_68_1","volume-title":"Privacy-Preserving and Robust Query Answering with Neural Networks. In NeurIPS 2023 Second Table Representation Learning Workshop.","author":"Zeighami Sepanta","year":"2023","unstructured":"Sepanta Zeighami and Cyrus Shahabi. 2023. NeuroDB: Efficient, Privacy-Preserving and Robust Query Answering with Neural Networks. In NeurIPS 2023 Second Table Representation Learning Workshop."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2021.9010015"},{"key":"e_1_3_2_2_70_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Zhang Zhikun","year":"2022","unstructured":"Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, and Yang Zhang. 2022. Inference attacks against graph neural networks. In 31st USENIX Security Symposium (USENIX Security 22). 4543--4560."},{"key":"e_1_3_2_2_71_1","first-page":"19172","article-title":"Cone: Cone embeddings for multi-hop reasoning over knowledge graphs","volume":"34","author":"Zhang Zhanqiu","year":"2021","unstructured":"Zhanqiu Zhang, Jie Wang, Jiajun Chen, Shuiwang Ji, and Feng Wu. 2021. Cone: Cone embeddings for multi-hop reasoning over knowledge graphs. Advances in Neural Information Processing Systems, Vol. 34 (2021), 19172--19183.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_72_1","volume-title":"International workshop on privacy, security, and trust in KDD. Springer, 153--171","author":"Zheleva Elena","year":"2007","unstructured":"Elena Zheleva and Lise Getoor. 2007. Preserving the privacy of sensitive relationships in graph data. In International workshop on privacy, security, and trust in KDD. Springer, 153--171."},{"key":"e_1_3_2_2_73_1","volume-title":"International Conference on Machine Learning. PMLR, 27454--27478","author":"Zhu Zhaocheng","year":"2022","unstructured":"Zhaocheng Zhu, Mikhail Galkin, Zuobai Zhang, and Jian Tang. 2022. Neural-symbolic models for logical queries on knowledge graphs. In International Conference on Machine Learning. PMLR, 27454--27478."}],"event":{"name":"KDD '24: The 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Barcelona Spain","acronym":"KDD '24"},"container-title":["Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671678","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637528.3671678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:00Z","timestamp":1750291560000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671678"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,24]]},"references-count":73,"alternative-id":["10.1145\/3637528.3671678","10.1145\/3637528"],"URL":"https:\/\/doi.org\/10.1145\/3637528.3671678","relation":{},"subject":[],"published":{"date-parts":[[2024,8,24]]},"assertion":[{"value":"2024-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}